*** empty log message ***
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
1d7e9d18 3 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
7686d77d 4 Free Software Foundation, Inc.
90ace9e9
JT
5 Contributed by Matt Thomas <matt@3am-software.com>.
6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
90ace9e9 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
90ace9e9 18
ae9a127f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
90ace9e9 23
90ace9e9 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
90ace9e9
JT
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/vax.h"
30
ce71b576
NC
31static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
32static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
34 struct bfd_hash_table *,
35 const char *);
36static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
37static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
38 asection *, const Elf_Internal_Rela *);
ce71b576
NC
39static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
40 struct elf_link_hash_entry *);
41static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
42static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
43 bfd *, asection *, bfd_byte *,
44 Elf_Internal_Rela *,
45 Elf_Internal_Sym *, asection **);
46static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
47 struct elf_link_hash_entry *,
48 Elf_Internal_Sym *);
49static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
50 struct bfd_link_info *);
6db7e006
MR
51static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
52 const arelent *);
ce71b576
NC
53
54static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
55static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
2c3fc389 56static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
57
58static reloc_howto_type howto_table[] = {
59 HOWTO (R_VAX_NONE, /* type */
60 0, /* rightshift */
61 0, /* size (0 = byte, 1 = short, 2 = long) */
62 0, /* bitsize */
b34976b6 63 FALSE, /* pc_relative */
90ace9e9
JT
64 0, /* bitpos */
65 complain_overflow_dont, /* complain_on_overflow */
66 bfd_elf_generic_reloc, /* special_function */
67 "R_VAX_NONE", /* name */
b34976b6 68 FALSE, /* partial_inplace */
90ace9e9
JT
69 0, /* src_mask */
70 0x00000000, /* dst_mask */
b34976b6 71 FALSE), /* pcrel_offset */
90ace9e9
JT
72
73 HOWTO (R_VAX_32, /* type */
74 0, /* rightshift */
75 2, /* size (0 = byte, 1 = short, 2 = long) */
76 32, /* bitsize */
b34976b6 77 FALSE, /* pc_relative */
90ace9e9
JT
78 0, /* bitpos */
79 complain_overflow_bitfield, /* complain_on_overflow */
80 bfd_elf_generic_reloc, /* special_function */
81 "R_VAX_32", /* name */
b34976b6 82 FALSE, /* partial_inplace */
90ace9e9
JT
83 0, /* src_mask */
84 0xffffffff, /* dst_mask */
b34976b6 85 FALSE), /* pcrel_offset */
90ace9e9
JT
86
87 HOWTO (R_VAX_16, /* type */
88 0, /* rightshift */
89 1, /* size (0 = byte, 1 = short, 2 = long) */
90 16, /* bitsize */
b34976b6 91 FALSE, /* pc_relative */
90ace9e9
JT
92 0, /* bitpos */
93 complain_overflow_bitfield, /* complain_on_overflow */
94 bfd_elf_generic_reloc, /* special_function */
95 "R_VAX_16", /* name */
b34976b6 96 FALSE, /* partial_inplace */
90ace9e9
JT
97 0, /* src_mask */
98 0x0000ffff, /* dst_mask */
b34976b6 99 FALSE), /* pcrel_offset */
90ace9e9
JT
100
101 HOWTO (R_VAX_8, /* type */
102 0, /* rightshift */
103 0, /* size (0 = byte, 1 = short, 2 = long) */
104 8, /* bitsize */
b34976b6 105 FALSE, /* pc_relative */
90ace9e9
JT
106 0, /* bitpos */
107 complain_overflow_bitfield, /* complain_on_overflow */
108 bfd_elf_generic_reloc, /* special_function */
109 "R_VAX_8", /* name */
b34976b6 110 FALSE, /* partial_inplace */
90ace9e9
JT
111 0, /* src_mask */
112 0x000000ff, /* dst_mask */
b34976b6 113 FALSE), /* pcrel_offset */
90ace9e9
JT
114
115 HOWTO (R_VAX_PC32, /* type */
116 0, /* rightshift */
117 2, /* size (0 = byte, 1 = short, 2 = long) */
118 32, /* bitsize */
b34976b6 119 TRUE, /* pc_relative */
90ace9e9
JT
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 bfd_elf_generic_reloc, /* special_function */
123 "R_VAX_PC32", /* name */
b34976b6 124 FALSE, /* partial_inplace */
90ace9e9
JT
125 0, /* src_mask */
126 0xffffffff, /* dst_mask */
b34976b6 127 TRUE), /* pcrel_offset */
90ace9e9
JT
128
129 HOWTO (R_VAX_PC16, /* type */
130 0, /* rightshift */
131 1, /* size (0 = byte, 1 = short, 2 = long) */
132 16, /* bitsize */
b34976b6 133 TRUE, /* pc_relative */
90ace9e9
JT
134 0, /* bitpos */
135 complain_overflow_signed, /* complain_on_overflow */
136 bfd_elf_generic_reloc, /* special_function */
137 "R_VAX_PC16", /* name */
b34976b6 138 FALSE, /* partial_inplace */
90ace9e9
JT
139 0, /* src_mask */
140 0x0000ffff, /* dst_mask */
b34976b6 141 TRUE), /* pcrel_offset */
90ace9e9
JT
142
143 HOWTO (R_VAX_PC8, /* type */
144 0, /* rightshift */
145 0, /* size (0 = byte, 1 = short, 2 = long) */
146 8, /* bitsize */
b34976b6 147 TRUE, /* pc_relative */
90ace9e9
JT
148 0, /* bitpos */
149 complain_overflow_signed, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_VAX_PC8", /* name */
b34976b6 152 FALSE, /* partial_inplace */
90ace9e9
JT
153 0, /* src_mask */
154 0x000000ff, /* dst_mask */
b34976b6 155 TRUE), /* pcrel_offset */
90ace9e9
JT
156
157 HOWTO (R_VAX_GOT32, /* type */
158 0, /* rightshift */
159 2, /* size (0 = byte, 1 = short, 2 = long) */
160 32, /* bitsize */
b34976b6 161 TRUE, /* pc_relative */
90ace9e9
JT
162 0, /* bitpos */
163 complain_overflow_bitfield, /* complain_on_overflow */
164 bfd_elf_generic_reloc, /* special_function */
165 "R_VAX_GOT32", /* name */
b34976b6 166 FALSE, /* partial_inplace */
90ace9e9
JT
167 0, /* src_mask */
168 0xffffffff, /* dst_mask */
b34976b6 169 TRUE), /* pcrel_offset */
90ace9e9
JT
170
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173 EMPTY_HOWTO (-1),
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176
177 HOWTO (R_VAX_PLT32, /* type */
178 0, /* rightshift */
179 2, /* size (0 = byte, 1 = short, 2 = long) */
180 32, /* bitsize */
b34976b6 181 TRUE, /* pc_relative */
90ace9e9
JT
182 0, /* bitpos */
183 complain_overflow_bitfield, /* complain_on_overflow */
184 bfd_elf_generic_reloc, /* special_function */
185 "R_VAX_PLT32", /* name */
b34976b6 186 FALSE, /* partial_inplace */
90ace9e9
JT
187 0, /* src_mask */
188 0xffffffff, /* dst_mask */
b34976b6 189 TRUE), /* pcrel_offset */
90ace9e9
JT
190
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193 EMPTY_HOWTO (-1),
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196
197 HOWTO (R_VAX_COPY, /* type */
198 0, /* rightshift */
199 0, /* size (0 = byte, 1 = short, 2 = long) */
200 0, /* bitsize */
b34976b6 201 FALSE, /* pc_relative */
90ace9e9
JT
202 0, /* bitpos */
203 complain_overflow_dont, /* complain_on_overflow */
204 bfd_elf_generic_reloc, /* special_function */
205 "R_VAX_COPY", /* name */
b34976b6 206 FALSE, /* partial_inplace */
90ace9e9
JT
207 0, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 FALSE), /* pcrel_offset */
90ace9e9
JT
210
211 HOWTO (R_VAX_GLOB_DAT, /* type */
212 0, /* rightshift */
213 2, /* size (0 = byte, 1 = short, 2 = long) */
214 32, /* bitsize */
b34976b6 215 FALSE, /* pc_relative */
90ace9e9
JT
216 0, /* bitpos */
217 complain_overflow_dont, /* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_VAX_GLOB_DAT", /* name */
b34976b6 220 FALSE, /* partial_inplace */
90ace9e9
JT
221 0, /* src_mask */
222 0xffffffff, /* dst_mask */
b34976b6 223 FALSE), /* pcrel_offset */
90ace9e9
JT
224
225 HOWTO (R_VAX_JMP_SLOT, /* type */
226 0, /* rightshift */
227 2, /* size (0 = byte, 1 = short, 2 = long) */
228 32, /* bitsize */
b34976b6 229 FALSE, /* pc_relative */
90ace9e9
JT
230 0, /* bitpos */
231 complain_overflow_dont, /* complain_on_overflow */
232 bfd_elf_generic_reloc, /* special_function */
233 "R_VAX_JMP_SLOT", /* name */
b34976b6 234 FALSE, /* partial_inplace */
90ace9e9
JT
235 0, /* src_mask */
236 0xffffffff, /* dst_mask */
b34976b6 237 FALSE), /* pcrel_offset */
90ace9e9
JT
238
239 HOWTO (R_VAX_RELATIVE, /* type */
240 0, /* rightshift */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
242 32, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
90ace9e9
JT
244 0, /* bitpos */
245 complain_overflow_dont, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_VAX_RELATIVE", /* name */
b34976b6 248 FALSE, /* partial_inplace */
90ace9e9
JT
249 0, /* src_mask */
250 0xffffffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
90ace9e9
JT
252
253 /* GNU extension to record C++ vtable hierarchy */
254 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
255 0, /* rightshift */
256 2, /* size (0 = byte, 1 = short, 2 = long) */
257 0, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
90ace9e9
JT
259 0, /* bitpos */
260 complain_overflow_dont, /* complain_on_overflow */
261 NULL, /* special_function */
262 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 263 FALSE, /* partial_inplace */
90ace9e9
JT
264 0, /* src_mask */
265 0, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
90ace9e9
JT
267
268 /* GNU extension to record C++ vtable member usage */
269 HOWTO (R_VAX_GNU_VTENTRY, /* type */
270 0, /* rightshift */
271 2, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
90ace9e9
JT
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
277 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 278 FALSE, /* partial_inplace */
90ace9e9
JT
279 0, /* src_mask */
280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
90ace9e9
JT
282};
283
284static void
ce71b576
NC
285rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
286 Elf_Internal_Rela *dst)
90ace9e9
JT
287{
288 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
289 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
290}
291
292#define elf_info_to_howto rtype_to_howto
293
294static const struct
295{
296 bfd_reloc_code_real_type bfd_val;
297 int elf_val;
298} reloc_map[] = {
299 { BFD_RELOC_NONE, R_VAX_NONE },
300 { BFD_RELOC_32, R_VAX_32 },
301 { BFD_RELOC_16, R_VAX_16 },
302 { BFD_RELOC_8, R_VAX_8 },
303 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
304 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
305 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
306 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
307 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
308 { BFD_RELOC_NONE, R_VAX_COPY },
309 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
310 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
311 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
312 { BFD_RELOC_CTOR, R_VAX_32 },
313 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
314 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
315};
316
317static reloc_howto_type *
ce71b576 318reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
319{
320 unsigned int i;
321 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
322 {
323 if (reloc_map[i].bfd_val == code)
324 return &howto_table[reloc_map[i].elf_val];
325 }
326 return 0;
327}
328
157090f7
AM
329static reloc_howto_type *
330reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
331 const char *r_name)
332{
333 unsigned int i;
334
335 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
336 if (howto_table[i].name != NULL
337 && strcasecmp (howto_table[i].name, r_name) == 0)
338 return &howto_table[i];
339
340 return NULL;
341}
342
90ace9e9 343#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 344#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
345#define ELF_ARCH bfd_arch_vax
346/* end code generated by elf.el */
90ace9e9
JT
347\f
348/* Functions for the VAX ELF linker. */
349
350/* The name of the dynamic interpreter. This is put in the .interp
351 section. */
352
353#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
354
355/* The size in bytes of an entry in the procedure linkage table. */
356
357#define PLT_ENTRY_SIZE 12
358
359/* The first entry in a procedure linkage table looks like this. See
360 the SVR4 ABI VAX supplement to see how this works. */
361
362static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
363{
364 0xdd, 0xef, /* pushl l^ */
365 0, 0, 0, 0, /* offset to .plt.got + 4 */
366 0x17, 0xff, /* jmp @L^(pc) */
367 0, 0, 0, 0, /* offset to .plt.got + 8 */
368};
369
370/* Subsequent entries in a procedure linkage table look like this. */
371
372static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
373{
6c4fb25a 374 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 375 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
376 0, 0, 0, 0, /* replaced with offset to start of .plt */
377 0, 0, 0, 0, /* index into .rela.plt */
378};
379
380/* The VAX linker needs to keep track of the number of relocs that it
381 decides to copy in check_relocs for each symbol. This is so that it
382 can discard PC relative relocs if it doesn't need them when linking
383 with -Bsymbolic. We store the information in a field extending the
384 regular ELF linker hash table. */
385
386/* This structure keeps track of the number of PC relative relocs we have
387 copied for a given symbol. */
388
389struct elf_vax_pcrel_relocs_copied
390{
391 /* Next section. */
392 struct elf_vax_pcrel_relocs_copied *next;
393 /* A section in dynobj. */
394 asection *section;
395 /* Number of relocs copied in this section. */
396 bfd_size_type count;
397};
398
399/* VAX ELF linker hash entry. */
400
401struct elf_vax_link_hash_entry
402{
403 struct elf_link_hash_entry root;
404
405 /* Number of PC relative relocs copied for this symbol. */
406 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
407
408 bfd_vma got_addend;
409};
410
90ace9e9
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576 413static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 414 void *);
90ace9e9 415
b29635ba
JT
416/* Declare this now that the above structures are defined. */
417
ce71b576 418static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 419 void *);
b29635ba 420
90ace9e9
JT
421/* Traverse an VAX ELF linker hash table. */
422
423#define elf_vax_link_hash_traverse(table, func, info) \
424 (elf_link_hash_traverse \
4dfe6ac6 425 ((table), \
2c3fc389 426 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
427 (info)))
428
90ace9e9
JT
429/* Create an entry in an VAX ELF linker hash table. */
430
431static struct bfd_hash_entry *
ce71b576
NC
432elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
433 struct bfd_hash_table *table,
434 const char *string)
90ace9e9
JT
435{
436 struct elf_vax_link_hash_entry *ret =
437 (struct elf_vax_link_hash_entry *) entry;
438
439 /* Allocate the structure if it has not already been allocated by a
440 subclass. */
ce71b576 441 if (ret == NULL)
90ace9e9
JT
442 ret = ((struct elf_vax_link_hash_entry *)
443 bfd_hash_allocate (table,
444 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 445 if (ret == NULL)
90ace9e9
JT
446 return (struct bfd_hash_entry *) ret;
447
448 /* Call the allocation method of the superclass. */
449 ret = ((struct elf_vax_link_hash_entry *)
450 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
451 table, string));
ce71b576 452 if (ret != NULL)
90ace9e9
JT
453 {
454 ret->pcrel_relocs_copied = NULL;
455 }
456
457 return (struct bfd_hash_entry *) ret;
458}
459
460/* Create an VAX ELF linker hash table. */
461
462static struct bfd_link_hash_table *
ce71b576 463elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 464{
4dfe6ac6
NC
465 struct elf_link_hash_table *ret;
466 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 467
ce71b576
NC
468 ret = bfd_malloc (amt);
469 if (ret == NULL)
90ace9e9
JT
470 return NULL;
471
4dfe6ac6 472 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 473 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
474 sizeof (struct elf_vax_link_hash_entry),
475 GENERIC_ELF_DATA))
90ace9e9
JT
476 {
477 free (ret);
478 return NULL;
479 }
480
4dfe6ac6 481 return &ret->root;
90ace9e9
JT
482}
483
484/* Keep vax-specific flags in the ELF header */
b34976b6 485static bfd_boolean
ce71b576 486elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
487{
488 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
489 elf_flags_init (abfd) = TRUE;
490 return TRUE;
90ace9e9
JT
491}
492
493/* Merge backend specific data from an object file to the output
494 object file when linking. */
b34976b6 495static bfd_boolean
ce71b576 496elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9 497{
90ace9e9
JT
498 flagword in_flags;
499
500 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
501 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 502 return TRUE;
90ace9e9
JT
503
504 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
505
506 if (!elf_flags_init (obfd))
507 {
b34976b6 508 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
509 elf_elfheader (obfd)->e_flags = in_flags;
510 }
511
b34976b6 512 return TRUE;
90ace9e9
JT
513}
514
515/* Display the flags field */
b34976b6 516static bfd_boolean
2c3fc389 517elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
518{
519 FILE *file = (FILE *) ptr;
520
521 BFD_ASSERT (abfd != NULL && ptr != NULL);
522
523 /* Print normal ELF private data. */
524 _bfd_elf_print_private_bfd_data (abfd, ptr);
525
526 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
527
528 /* xgettext:c-format */
529 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530
179d3252 531 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
532 fprintf (file, _(" [nonpic]"));
533
179d3252 534 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
535 fprintf (file, _(" [d-float]"));
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
538 fprintf (file, _(" [g-float]"));
539
540 fputc ('\n', file);
541
b34976b6 542 return TRUE;
90ace9e9
JT
543}
544/* Look through the relocs for a section during the first phase, and
545 allocate space in the global offset table or procedure linkage
546 table. */
547
b34976b6 548static bfd_boolean
ce71b576
NC
549elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 const Elf_Internal_Rela *relocs)
90ace9e9
JT
551{
552 bfd *dynobj;
553 Elf_Internal_Shdr *symtab_hdr;
554 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
555 const Elf_Internal_Rela *rel;
556 const Elf_Internal_Rela *rel_end;
557 asection *sgot;
558 asection *srelgot;
559 asection *sreloc;
560
1049f94e 561 if (info->relocatable)
b34976b6 562 return TRUE;
90ace9e9
JT
563
564 dynobj = elf_hash_table (info)->dynobj;
565 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
567
568 sgot = NULL;
569 srelgot = NULL;
570 sreloc = NULL;
571
572 rel_end = relocs + sec->reloc_count;
573 for (rel = relocs; rel < rel_end; rel++)
574 {
575 unsigned long r_symndx;
576 struct elf_link_hash_entry *h;
577
578 r_symndx = ELF32_R_SYM (rel->r_info);
579
580 if (r_symndx < symtab_hdr->sh_info)
581 h = NULL;
582 else
973a3492
L
583 {
584 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 while (h->root.type == bfd_link_hash_indirect
586 || h->root.type == bfd_link_hash_warning)
587 h = (struct elf_link_hash_entry *) h->root.u.i.link;
588 }
90ace9e9
JT
589
590 switch (ELF32_R_TYPE (rel->r_info))
591 {
592 case R_VAX_GOT32:
fe723c87
MT
593 BFD_ASSERT (h != NULL);
594 if (h->forced_local
595 || h == elf_hash_table (info)->hgot
596 || h == elf_hash_table (info)->hplt)
90ace9e9
JT
597 break;
598
7b6021f1
MR
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
601 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
602 break;
603
90ace9e9
JT
604 /* This symbol requires a global offset table entry. */
605
606 if (dynobj == NULL)
607 {
608 /* Create the .got section. */
609 elf_hash_table (info)->dynobj = dynobj = abfd;
610 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 611 return FALSE;
90ace9e9
JT
612 }
613
614 if (sgot == NULL)
615 {
3d4d4302 616 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
617 BFD_ASSERT (sgot != NULL);
618 }
619
620 if (srelgot == NULL
621 && (h != NULL || info->shared))
622 {
3d4d4302 623 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
624 if (srelgot == NULL)
625 {
3d4d4302
AM
626 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
627 | SEC_IN_MEMORY | SEC_LINKER_CREATED
628 | SEC_READONLY);
629
630 srelgot = bfd_make_section_anyway_with_flags (dynobj,
631 ".rela.got",
632 flags);
90ace9e9 633 if (srelgot == NULL
90ace9e9 634 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 635 return FALSE;
90ace9e9
JT
636 }
637 }
638
639 if (h != NULL)
640 {
641 struct elf_vax_link_hash_entry *eh;
642
643 eh = (struct elf_vax_link_hash_entry *) h;
644 if (h->got.refcount == -1)
645 {
646 h->got.refcount = 1;
647 eh->got_addend = rel->r_addend;
90ace9e9
JT
648 }
649 else
650 {
651 h->got.refcount++;
652 if (eh->got_addend != (bfd_vma) rel->r_addend)
653 (*_bfd_error_handler)
fe723c87
MT
654 (_("%s: warning: GOT addend of %ld to `%s' does"
655 " not match previous GOT addend of %ld"),
656 bfd_get_filename (abfd), rel->r_addend,
657 h->root.root.string,
658 eh->got_addend);
cedb70c5 659
90ace9e9
JT
660 }
661 }
662 break;
663
664 case R_VAX_PLT32:
665 /* This symbol requires a procedure linkage table entry. We
666 actually build the entry in adjust_dynamic_symbol,
667 because this might be a case of linking PIC code which is
668 never referenced by a dynamic object, in which case we
669 don't need to generate a procedure linkage table entry
670 after all. */
671
672 /* If this is a local symbol, we resolve it directly without
673 creating a procedure linkage table entry. */
fe723c87 674 BFD_ASSERT (h != NULL);
7b6021f1 675 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || h->forced_local)
fe723c87 676 break;
90ace9e9 677
f5385ebf 678 h->needs_plt = 1;
90ace9e9
JT
679 if (h->plt.refcount == -1)
680 h->plt.refcount = 1;
681 else
682 h->plt.refcount++;
683 break;
684
685 case R_VAX_PC8:
686 case R_VAX_PC16:
687 case R_VAX_PC32:
688 /* If we are creating a shared library and this is not a local
689 symbol, we need to copy the reloc into the shared library.
690 However when linking with -Bsymbolic and this is a global
691 symbol which is defined in an object we are including in the
692 link (i.e., DEF_REGULAR is set), then we can resolve the
693 reloc directly. At this point we have not seen all the input
694 files, so it is possible that DEF_REGULAR is not set now but
695 will be set later (it is never cleared). We account for that
696 possibility below by storing information in the
697 pcrel_relocs_copied field of the hash table entry. */
698 if (!(info->shared
699 && (sec->flags & SEC_ALLOC) != 0
700 && h != NULL
701 && (!info->symbolic
f5385ebf 702 || !h->def_regular)))
90ace9e9 703 {
7b6021f1
MR
704 if (h != NULL
705 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
706 && !h->forced_local)
90ace9e9
JT
707 {
708 /* Make sure a plt entry is created for this symbol if
709 it turns out to be a function defined by a dynamic
710 object. */
711 if (h->plt.refcount == -1)
712 h->plt.refcount = 1;
713 else
714 h->plt.refcount++;
715 }
716 break;
717 }
7b6021f1
MR
718 /* If this is a local symbol, we can resolve it directly. */
719 if (h != NULL
720 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
721 || h->forced_local))
fe723c87
MT
722 break;
723
90ace9e9
JT
724 /* Fall through. */
725 case R_VAX_8:
726 case R_VAX_16:
727 case R_VAX_32:
7b6021f1 728 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
729 {
730 /* Make sure a plt entry is created for this symbol if it
731 turns out to be a function defined by a dynamic object. */
732 if (h->plt.refcount == -1)
733 h->plt.refcount = 1;
734 else
735 h->plt.refcount++;
736 }
737
738 /* If we are creating a shared library, we need to copy the
739 reloc into the shared library. */
740 if (info->shared
741 && (sec->flags & SEC_ALLOC) != 0)
742 {
743 /* When creating a shared object, we must copy these
744 reloc types into the output file. We create a reloc
745 section in dynobj and make room for this reloc. */
746 if (sreloc == NULL)
747 {
83bac4b0
NC
748 sreloc = _bfd_elf_make_dynamic_reloc_section
749 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 750
83bac4b0 751 if (sreloc == NULL)
b34976b6 752 return FALSE;
90ace9e9 753
90ace9e9
JT
754 if (sec->flags & SEC_READONLY)
755 info->flags |= DF_TEXTREL;
756 }
757
eea6121a 758 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
759
760 /* If we are linking with -Bsymbolic, we count the number of
761 PC relative relocations we have entered for this symbol,
762 so that we can discard them again if the symbol is later
763 defined by a regular object. Note that this function is
19852a2a 764 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
765 which means that h is really a pointer to an
766 elf_vax_link_hash_entry. */
767 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
768 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
769 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
770 && info->symbolic)
771 {
772 struct elf_vax_link_hash_entry *eh;
773 struct elf_vax_pcrel_relocs_copied *p;
774
775 eh = (struct elf_vax_link_hash_entry *) h;
776
777 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
778 if (p->section == sreloc)
779 break;
780
781 if (p == NULL)
782 {
783 p = ((struct elf_vax_pcrel_relocs_copied *)
784 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
785 if (p == NULL)
b34976b6 786 return FALSE;
90ace9e9
JT
787 p->next = eh->pcrel_relocs_copied;
788 eh->pcrel_relocs_copied = p;
789 p->section = sreloc;
790 p->count = 0;
791 }
792
793 ++p->count;
794 }
795 }
796
797 break;
798
799 /* This relocation describes the C++ object vtable hierarchy.
800 Reconstruct it for later use during GC. */
801 case R_VAX_GNU_VTINHERIT:
c152c796 802 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 803 return FALSE;
90ace9e9
JT
804 break;
805
806 /* This relocation describes which C++ vtable entries are actually
807 used. Record for later use during GC. */
808 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
809 BFD_ASSERT (h != NULL);
810 if (h != NULL
811 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 812 return FALSE;
90ace9e9
JT
813 break;
814
815 default:
816 break;
817 }
818 }
819
b34976b6 820 return TRUE;
90ace9e9
JT
821}
822
823/* Return the section that should be marked against GC for a given
824 relocation. */
825
826static asection *
ce71b576 827elf_vax_gc_mark_hook (asection *sec,
07adf181 828 struct bfd_link_info *info,
ce71b576
NC
829 Elf_Internal_Rela *rel,
830 struct elf_link_hash_entry *h,
831 Elf_Internal_Sym *sym)
90ace9e9
JT
832{
833 if (h != NULL)
07adf181
AM
834 switch (ELF32_R_TYPE (rel->r_info))
835 {
836 case R_VAX_GNU_VTINHERIT:
837 case R_VAX_GNU_VTENTRY:
838 return NULL;
839 }
840
841 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
842}
843
844/* Update the got entry reference counts for the section being removed. */
845
b34976b6 846static bfd_boolean
ce71b576
NC
847elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
848 const Elf_Internal_Rela *relocs)
90ace9e9
JT
849{
850 Elf_Internal_Shdr *symtab_hdr;
851 struct elf_link_hash_entry **sym_hashes;
90ace9e9 852 const Elf_Internal_Rela *rel, *relend;
90ace9e9 853 bfd *dynobj;
90ace9e9 854
7dda2462
TG
855 if (info->relocatable)
856 return TRUE;
857
90ace9e9
JT
858 dynobj = elf_hash_table (info)->dynobj;
859 if (dynobj == NULL)
b34976b6 860 return TRUE;
90ace9e9 861
babfd660
KH
862 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
863 sym_hashes = elf_sym_hashes (abfd);
864
90ace9e9
JT
865 relend = relocs + sec->reloc_count;
866 for (rel = relocs; rel < relend; rel++)
867 {
babfd660 868 unsigned long r_symndx;
3eb128b2
AM
869 struct elf_link_hash_entry *h = NULL;
870
871 r_symndx = ELF32_R_SYM (rel->r_info);
872 if (r_symndx >= symtab_hdr->sh_info)
873 {
874 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
875 while (h->root.type == bfd_link_hash_indirect
876 || h->root.type == bfd_link_hash_warning)
877 h = (struct elf_link_hash_entry *) h->root.u.i.link;
878 }
babfd660 879
90ace9e9
JT
880 switch (ELF32_R_TYPE (rel->r_info))
881 {
882 case R_VAX_GOT32:
3eb128b2
AM
883 if (h != NULL && h->got.refcount > 0)
884 --h->got.refcount;
90ace9e9
JT
885 break;
886
887 case R_VAX_PLT32:
888 case R_VAX_PC8:
889 case R_VAX_PC16:
890 case R_VAX_PC32:
891 case R_VAX_8:
892 case R_VAX_16:
893 case R_VAX_32:
3eb128b2
AM
894 if (h != NULL && h->plt.refcount > 0)
895 --h->plt.refcount;
90ace9e9
JT
896 break;
897
898 default:
899 break;
900 }
901 }
902
b34976b6 903 return TRUE;
90ace9e9
JT
904}
905
906/* Adjust a symbol defined by a dynamic object and referenced by a
907 regular object. The current definition is in some section of the
908 dynamic object, but we're not including those sections. We have to
909 change the definition to something the rest of the link can
910 understand. */
911
b34976b6 912static bfd_boolean
90ace9e9
JT
913elf_vax_adjust_dynamic_symbol (info, h)
914 struct bfd_link_info *info;
915 struct elf_link_hash_entry *h;
916{
917 bfd *dynobj;
918 asection *s;
90ace9e9
JT
919
920 dynobj = elf_hash_table (info)->dynobj;
921
922 /* Make sure we know what is going on here. */
923 BFD_ASSERT (dynobj != NULL
f5385ebf 924 && (h->needs_plt
f6e332e6 925 || h->u.weakdef != NULL
f5385ebf
AM
926 || (h->def_dynamic
927 && h->ref_regular
928 && !h->def_regular)));
90ace9e9
JT
929
930 /* If this is a function, put it in the procedure linkage table. We
931 will fill in the contents of the procedure linkage table later,
932 when we know the address of the .got section. */
933 if (h->type == STT_FUNC
f5385ebf 934 || h->needs_plt)
90ace9e9
JT
935 {
936 if (! info->shared
f5385ebf
AM
937 && !h->def_dynamic
938 && !h->ref_dynamic
90ace9e9
JT
939 /* We must always create the plt entry if it was referenced
940 by a PLTxxO relocation. In this case we already recorded
941 it as a dynamic symbol. */
942 && h->dynindx == -1)
943 {
944 /* This case can occur if we saw a PLTxx reloc in an input
945 file, but the symbol was never referred to by a dynamic
946 object. In such a case, we don't actually need to build
947 a procedure linkage table, and we can just do a PCxx
948 reloc instead. */
f5385ebf 949 BFD_ASSERT (h->needs_plt);
90ace9e9 950 h->plt.offset = (bfd_vma) -1;
b34976b6 951 return TRUE;
90ace9e9
JT
952 }
953
954 /* GC may have rendered this entry unused. */
955 if (h->plt.refcount <= 0)
956 {
f5385ebf 957 h->needs_plt = 0;
90ace9e9 958 h->plt.offset = (bfd_vma) -1;
b34976b6 959 return TRUE;
90ace9e9
JT
960 }
961
962 /* Make sure this symbol is output as a dynamic symbol. */
963 if (h->dynindx == -1)
964 {
c152c796 965 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 966 return FALSE;
90ace9e9
JT
967 }
968
3d4d4302 969 s = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
970 BFD_ASSERT (s != NULL);
971
972 /* If this is the first .plt entry, make room for the special
973 first entry. */
eea6121a 974 if (s->size == 0)
90ace9e9 975 {
eea6121a 976 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
977 }
978
979 /* If this symbol is not defined in a regular file, and we are
980 not generating a shared library, then set the symbol to this
981 location in the .plt. This is required to make function
982 pointers compare as equal between the normal executable and
983 the shared library. */
984 if (!info->shared
f5385ebf 985 && !h->def_regular)
90ace9e9
JT
986 {
987 h->root.u.def.section = s;
eea6121a 988 h->root.u.def.value = s->size;
90ace9e9
JT
989 }
990
eea6121a 991 h->plt.offset = s->size;
90ace9e9
JT
992
993 /* Make room for this entry. */
eea6121a 994 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
995
996 /* We also need to make an entry in the .got.plt section, which
997 will be placed in the .got section by the linker script. */
998
3d4d4302 999 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1000 BFD_ASSERT (s != NULL);
eea6121a 1001 s->size += 4;
90ace9e9
JT
1002
1003 /* We also need to make an entry in the .rela.plt section. */
1004
3d4d4302 1005 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 1006 BFD_ASSERT (s != NULL);
eea6121a 1007 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1008
b34976b6 1009 return TRUE;
90ace9e9
JT
1010 }
1011
1012 /* Reinitialize the plt offset now that it is not used as a reference
1013 count any more. */
1014 h->plt.offset = (bfd_vma) -1;
1015
1016 /* If this is a weak symbol, and there is a real definition, the
1017 processor independent code will have arranged for us to see the
1018 real definition first, and we can just use the same value. */
f6e332e6 1019 if (h->u.weakdef != NULL)
90ace9e9 1020 {
f6e332e6
AM
1021 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1022 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1023 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1024 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1025 return TRUE;
90ace9e9
JT
1026 }
1027
1028 /* This is a reference to a symbol defined by a dynamic object which
1029 is not a function. */
1030
1031 /* If we are creating a shared library, we must presume that the
1032 only references to the symbol are via the global offset table.
1033 For such cases we need not do anything here; the relocations will
1034 be handled correctly by relocate_section. */
1035 if (info->shared)
b34976b6 1036 return TRUE;
90ace9e9
JT
1037
1038 /* We must allocate the symbol in our .dynbss section, which will
1039 become part of the .bss section of the executable. There will be
1040 an entry for this symbol in the .dynsym section. The dynamic
1041 object will contain position independent code, so all references
1042 from the dynamic object to this symbol will go through the global
1043 offset table. The dynamic linker will use the .dynsym entry to
1044 determine the address it must put in the global offset table, so
1045 both the dynamic object and the regular object will refer to the
1046 same memory location for the variable. */
1047
3d4d4302 1048 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
1049 BFD_ASSERT (s != NULL);
1050
1051 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1052 copy the initial value out of the dynamic object and into the
1053 runtime process image. We need to remember the offset into the
1054 .rela.bss section we are going to use. */
1d7e9d18 1055 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
1056 {
1057 asection *srel;
1058
3d4d4302 1059 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 1060 BFD_ASSERT (srel != NULL);
eea6121a 1061 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1062 h->needs_copy = 1;
90ace9e9
JT
1063 }
1064
027297b7 1065 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1066}
1067
1068/* Set the sizes of the dynamic sections. */
1069
b34976b6 1070static bfd_boolean
ce71b576 1071elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1072{
1073 bfd *dynobj;
1074 asection *s;
b34976b6
AM
1075 bfd_boolean plt;
1076 bfd_boolean relocs;
1077 bfd_boolean reltext;
90ace9e9
JT
1078
1079 dynobj = elf_hash_table (info)->dynobj;
1080 BFD_ASSERT (dynobj != NULL);
1081
1082 if (elf_hash_table (info)->dynamic_sections_created)
1083 {
1084 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1085 if (info->executable)
90ace9e9 1086 {
3d4d4302 1087 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1088 BFD_ASSERT (s != NULL);
eea6121a 1089 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1090 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1091 }
1092 }
1093 else
1094 {
1095 /* We may have created entries in the .rela.got and .got sections.
1096 However, if we are not creating the dynamic sections, we will
1097 not actually use these entries. Reset the size of .rela.got
1098 and .got, which will cause it to get stripped from the output
1099 file below. */
3d4d4302 1100 s = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9 1101 if (s != NULL)
eea6121a 1102 s->size = 0;
3d4d4302 1103 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1104 if (s != NULL)
eea6121a 1105 s->size = 0;
3d4d4302 1106 s = bfd_get_linker_section (dynobj, ".got");
90ace9e9 1107 if (s != NULL)
eea6121a 1108 s->size = 0;
90ace9e9
JT
1109 }
1110
1111 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1112 relative relocs against symbols defined in a regular object. We
1113 allocated space for them in the check_relocs routine, but we will not
1114 fill them in in the relocate_section routine. */
1115 if (info->shared && info->symbolic)
4dfe6ac6 1116 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1117 elf_vax_discard_copies,
ce71b576 1118 NULL);
b29635ba 1119
b34976b6 1120 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1121 discard all the got entries we've recorded. Otherwise, we need to
1122 instantiate (allocate space for them). */
1123 elf_link_hash_traverse (elf_hash_table (info),
1124 elf_vax_instantiate_got_entries,
2c3fc389 1125 info);
90ace9e9
JT
1126
1127 /* The check_relocs and adjust_dynamic_symbol entry points have
1128 determined the sizes of the various dynamic sections. Allocate
1129 memory for them. */
b34976b6
AM
1130 plt = FALSE;
1131 relocs = FALSE;
1132 reltext = FALSE;
90ace9e9
JT
1133 for (s = dynobj->sections; s != NULL; s = s->next)
1134 {
1135 const char *name;
90ace9e9
JT
1136
1137 if ((s->flags & SEC_LINKER_CREATED) == 0)
1138 continue;
1139
1140 /* It's OK to base decisions on the section name, because none
1141 of the dynobj section names depend upon the input files. */
1142 name = bfd_get_section_name (dynobj, s);
1143
90ace9e9
JT
1144 if (strcmp (name, ".plt") == 0)
1145 {
c456f082
AM
1146 /* Remember whether there is a PLT. */
1147 plt = s->size != 0;
90ace9e9 1148 }
0112cd26 1149 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1150 {
c456f082 1151 if (s->size != 0)
90ace9e9
JT
1152 {
1153 asection *target;
1154
1155 /* Remember whether there are any reloc sections other
1156 than .rela.plt. */
1157 if (strcmp (name, ".rela.plt") != 0)
1158 {
1159 const char *outname;
1160
b34976b6 1161 relocs = TRUE;
90ace9e9
JT
1162
1163 /* If this relocation section applies to a read only
1164 section, then we probably need a DT_TEXTREL
1165 entry. .rela.plt is actually associated with
1166 .got.plt, which is never readonly. */
1167 outname = bfd_get_section_name (output_bfd,
1168 s->output_section);
1169 target = bfd_get_section_by_name (output_bfd, outname + 5);
1170 if (target != NULL
1171 && (target->flags & SEC_READONLY) != 0
1172 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1173 reltext = TRUE;
90ace9e9
JT
1174 }
1175
1176 /* We use the reloc_count field as a counter if we need
1177 to copy relocs into the output file. */
1178 s->reloc_count = 0;
1179 }
1180 }
0112cd26 1181 else if (! CONST_STRNEQ (name, ".got")
c456f082 1182 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1183 {
1184 /* It's not one of our sections, so don't allocate space. */
1185 continue;
1186 }
1187
c456f082 1188 if (s->size == 0)
90ace9e9 1189 {
c456f082
AM
1190 /* If we don't need this section, strip it from the
1191 output file. This is mostly to handle .rela.bss and
1192 .rela.plt. We must create both sections in
1193 create_dynamic_sections, because they must be created
1194 before the linker maps input sections to output
1195 sections. The linker does that before
1196 adjust_dynamic_symbol is called, and it is that
1197 function which decides whether anything needs to go
1198 into these sections. */
8423293d 1199 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1200 continue;
1201 }
1202
c456f082
AM
1203 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1204 continue;
1205
90ace9e9 1206 /* Allocate memory for the section contents. */
eea6121a 1207 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1208 if (s->contents == NULL)
b34976b6 1209 return FALSE;
90ace9e9
JT
1210 }
1211
1212 if (elf_hash_table (info)->dynamic_sections_created)
1213 {
1214 /* Add some entries to the .dynamic section. We fill in the
1215 values later, in elf_vax_finish_dynamic_sections, but we
1216 must add the entries now so that we get the correct size for
1217 the .dynamic section. The DT_DEBUG entry is filled in by the
1218 dynamic linker and used by the debugger. */
1219#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1220 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1221
1222 if (!info->shared)
1223 {
1224 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1225 return FALSE;
90ace9e9
JT
1226 }
1227
1228 if (plt)
1229 {
1230 if (!add_dynamic_entry (DT_PLTGOT, 0)
1231 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1232 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1233 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1234 return FALSE;
90ace9e9
JT
1235 }
1236
1237 if (relocs)
1238 {
1239 if (!add_dynamic_entry (DT_RELA, 0)
1240 || !add_dynamic_entry (DT_RELASZ, 0)
1241 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1242 return FALSE;
90ace9e9
JT
1243 }
1244
1245 if (reltext || (info->flags & DF_TEXTREL) != 0)
1246 {
1247 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1248 return FALSE;
90ace9e9
JT
1249 }
1250 }
1251#undef add_dynamic_entry
1252
b34976b6 1253 return TRUE;
90ace9e9
JT
1254}
1255
1256/* This function is called via elf_vax_link_hash_traverse if we are
1257 creating a shared object with -Bsymbolic. It discards the space
1258 allocated to copy PC relative relocs against symbols which are defined
1259 in regular objects. We allocated space for them in the check_relocs
1260 routine, but we won't fill them in in the relocate_section routine. */
1261
b34976b6 1262static bfd_boolean
ce71b576 1263elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1264 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1265{
1266 struct elf_vax_pcrel_relocs_copied *s;
1267
90ace9e9 1268 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1269 if (!h->root.def_regular)
b34976b6 1270 return TRUE;
90ace9e9
JT
1271
1272 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1273 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1274
b34976b6 1275 return TRUE;
90ace9e9
JT
1276}
1277
b29635ba
JT
1278/* This function is called via elf_link_hash_traverse. It looks for entries
1279 that have GOT or PLT (.GOT) references. If creating a static object or a
1280 shared object with -Bsymbolic, it resets the reference count back to 0
1281 and sets the offset to -1 so normal PC32 relocation will be done. If
1282 creating a shared object or executable, space in the .got and .rela.got
1283 will be reserved for the symbol. */
1284
b34976b6 1285static bfd_boolean
2c3fc389 1286elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1287{
1288 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1289 bfd *dynobj;
1290 asection *sgot;
1291 asection *srelgot;
b34976b6 1292
b29635ba
JT
1293 /* We don't care about non-GOT (and non-PLT) entries. */
1294 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1295 return TRUE;
b29635ba
JT
1296
1297 dynobj = elf_hash_table (info)->dynobj;
1298 if (dynobj == NULL)
b34976b6 1299 return TRUE;
b29635ba 1300
3d4d4302
AM
1301 sgot = bfd_get_linker_section (dynobj, ".got");
1302 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
b29635ba
JT
1303
1304 if (!elf_hash_table (info)->dynamic_sections_created
fe723c87
MT
1305 || (info->shared && info->symbolic)
1306 || h->forced_local)
b29635ba
JT
1307 {
1308 h->got.refcount = 0;
1309 h->got.offset = (bfd_vma) -1;
1310 h->plt.refcount = 0;
1311 h->plt.offset = (bfd_vma) -1;
1312 }
1313 else if (h->got.refcount > 0)
1314 {
886815b2
MR
1315 bfd_boolean dyn;
1316
b29635ba
JT
1317 /* Make sure this symbol is output as a dynamic symbol. */
1318 if (h->dynindx == -1)
1319 {
c152c796 1320 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1321 return FALSE;
b29635ba
JT
1322 }
1323
886815b2 1324 dyn = elf_hash_table (info)->dynamic_sections_created;
b29635ba 1325 /* Allocate space in the .got and .rela.got sections. */
886815b2
MR
1326 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1327 && (info->shared
1328 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1329 {
1330 sgot->size += 4;
1331 srelgot->size += sizeof (Elf32_External_Rela);
1332 }
b29635ba
JT
1333 }
1334
b34976b6 1335 return TRUE;
b29635ba
JT
1336}
1337
90ace9e9
JT
1338/* Relocate an VAX ELF section. */
1339
b34976b6 1340static bfd_boolean
ce71b576
NC
1341elf_vax_relocate_section (bfd *output_bfd,
1342 struct bfd_link_info *info,
1343 bfd *input_bfd,
1344 asection *input_section,
1345 bfd_byte *contents,
1346 Elf_Internal_Rela *relocs,
1347 Elf_Internal_Sym *local_syms,
1348 asection **local_sections)
90ace9e9
JT
1349{
1350 bfd *dynobj;
1351 Elf_Internal_Shdr *symtab_hdr;
1352 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1353 bfd_vma plt_index;
1354 bfd_vma got_offset;
1355 asection *sgot;
1356 asection *splt;
1357 asection *sgotplt;
1358 asection *sreloc;
1359 Elf_Internal_Rela *rel;
1360 Elf_Internal_Rela *relend;
1361
1362 dynobj = elf_hash_table (info)->dynobj;
1363 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1364 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1365
1366 sgot = NULL;
1367 splt = NULL;
1368 sgotplt = NULL;
1369 sreloc = NULL;
1370
1371 rel = relocs;
1372 relend = relocs + input_section->reloc_count;
1373 for (; rel < relend; rel++)
1374 {
1375 int r_type;
1376 reloc_howto_type *howto;
1377 unsigned long r_symndx;
1378 struct elf_link_hash_entry *h;
1379 Elf_Internal_Sym *sym;
1380 asection *sec;
1381 bfd_vma relocation;
1382 bfd_reloc_status_type r;
1383
1384 r_type = ELF32_R_TYPE (rel->r_info);
1385 if (r_type < 0 || r_type >= (int) R_VAX_max)
1386 {
1387 bfd_set_error (bfd_error_bad_value);
b34976b6 1388 return FALSE;
90ace9e9
JT
1389 }
1390 howto = howto_table + r_type;
1391
f0fe0e16 1392 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1393 h = NULL;
1394 sym = NULL;
1395 sec = NULL;
1396 if (r_symndx < symtab_hdr->sh_info)
1397 {
1398 sym = local_syms + r_symndx;
1399 sec = local_sections[r_symndx];
8517fae7 1400 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1401 }
1402 else
1403 {
560e09e9
NC
1404 bfd_boolean unresolved_reloc;
1405 bfd_boolean warned;
1406
b2a8e766
AM
1407 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1408 r_symndx, symtab_hdr, sym_hashes,
1409 h, sec, relocation,
1410 unresolved_reloc, warned);
ce71b576 1411
560e09e9 1412 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1413 || h->root.type == bfd_link_hash_defweak)
560e09e9 1414 && ((r_type == R_VAX_PLT32
90ace9e9 1415 && h->plt.offset != (bfd_vma) -1
fe723c87 1416 && !h->forced_local
90ace9e9
JT
1417 && elf_hash_table (info)->dynamic_sections_created)
1418 || (r_type == R_VAX_GOT32
fe723c87
MT
1419 && h->got.offset != (bfd_vma) -1
1420 && !h->forced_local
90ace9e9
JT
1421 && elf_hash_table (info)->dynamic_sections_created
1422 && (! info->shared
1423 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1424 || !h->def_regular))
90ace9e9
JT
1425 || (info->shared
1426 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1427 || !h->def_regular)
90ace9e9
JT
1428 && ((input_section->flags & SEC_ALLOC) != 0
1429 /* DWARF will emit R_VAX_32 relocations in its
1430 sections against symbols defined externally
1431 in shared libraries. We can't do anything
1432 with them here. */
1433
1434 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1435 && h->def_dynamic))
90ace9e9
JT
1436 && (r_type == R_VAX_8
1437 || r_type == R_VAX_16
fe723c87 1438 || r_type == R_VAX_32))))
560e09e9
NC
1439 /* In these cases, we don't need the relocation
1440 value. We check specially because in some
1441 obscure cases sec->output_section will be NULL. */
90ace9e9 1442 relocation = 0;
90ace9e9
JT
1443 }
1444
dbaa2011 1445 if (sec != NULL && discarded_section (sec))
e4067dbb 1446 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1447 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
1448
1449 if (info->relocatable)
1450 continue;
1451
90ace9e9
JT
1452 switch (r_type)
1453 {
1454 case R_VAX_GOT32:
1455 /* Relocation is to the address of the entry for this symbol
1456 in the global offset table. */
7b6021f1
MR
1457 if (h == NULL
1458 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1459 || h->got.offset == (bfd_vma) -1
1460 || h->forced_local)
90ace9e9
JT
1461 break;
1462
1463 /* Relocation is the offset of the entry for this symbol in
1464 the global offset table. */
1465
1466 {
886815b2 1467 bfd_boolean dyn;
90ace9e9
JT
1468 bfd_vma off;
1469
90ace9e9
JT
1470 if (sgot == NULL)
1471 {
3d4d4302 1472 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
1473 BFD_ASSERT (sgot != NULL);
1474 }
1475
1476 BFD_ASSERT (h != NULL);
1477 off = h->got.offset;
1478 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1479 BFD_ASSERT (off < sgot->size);
90ace9e9 1480
886815b2
MR
1481 dyn = elf_hash_table (info)->dynamic_sections_created;
1482 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1483 || (info->shared
1484 && SYMBOL_REFERENCES_LOCAL (info, h)))
90ace9e9
JT
1485 {
1486 /* The symbol was forced to be local
1487 because of a version file.. We must initialize
1488 this entry in the global offset table. Since
1489 the offset must always be a multiple of 4, we
1490 use the least significant bit to record whether
1491 we have initialized it already.
1492
1493 When doing a dynamic link, we create a .rela.got
1494 relocation entry to initialize the value. This
1495 is done in the finish_dynamic_symbol routine. */
1496 if ((off & 1) != 0)
1497 off &= ~1;
1498 else
1499 {
1500 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1501 sgot->contents + off);
1502 h->got.offset |= 1;
1503 }
1504 } else {
1505 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1506 }
1507
1508 relocation = sgot->output_offset + off;
b29635ba 1509 /* The GOT relocation uses the addend. */
90ace9e9
JT
1510 rel->r_addend = 0;
1511
b29635ba
JT
1512 /* Change the reference to be indirect. */
1513 contents[rel->r_offset - 1] |= 0x10;
1514 relocation += sgot->output_section->vma;
90ace9e9
JT
1515 }
1516 break;
1517
04981bc1
MR
1518 case R_VAX_PC32:
1519 /* If we are creating an executable and the function this
1520 reloc refers to is in a shared lib, then we made a PLT
1521 entry for this symbol and need to handle the reloc like
1522 a PLT reloc. */
1523 if (info->shared)
1524 goto r_vax_pc32_shared;
1525 /* Fall through. */
90ace9e9
JT
1526 case R_VAX_PLT32:
1527 /* Relocation is to the entry for this symbol in the
1528 procedure linkage table. */
1529
1530 /* Resolve a PLTxx reloc against a local symbol directly,
1531 without using the procedure linkage table. */
7b6021f1
MR
1532 if (h == NULL
1533 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1534 || h->forced_local)
90ace9e9
JT
1535 break;
1536
1537 if (h->plt.offset == (bfd_vma) -1
1538 || !elf_hash_table (info)->dynamic_sections_created)
1539 {
1540 /* We didn't make a PLT entry for this symbol. This
1541 happens when statically linking PIC code, or when
1542 using -Bsymbolic. */
1543 break;
1544 }
1545
1546 if (splt == NULL)
1547 {
3d4d4302 1548 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1549 BFD_ASSERT (splt != NULL);
1550 }
1551
1552 if (sgotplt == NULL)
1553 {
3d4d4302 1554 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
d76b263e 1555 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1556 }
1557
1558 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1559
1560 /* Get the offset into the .got table of the entry that
1561 corresponds to this function. Each .got entry is 4 bytes.
1562 The first two are reserved. */
1563 got_offset = (plt_index + 3) * 4;
1564
9e86195c 1565 /* We want the relocation to point into the .got.plt instead
cedb70c5 1566 of the plt itself. */
90ace9e9
JT
1567 relocation = (sgotplt->output_section->vma
1568 + sgotplt->output_offset
1569 + got_offset);
1570 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1571 if (rel->r_addend == 2)
1572 {
1573 h->plt.offset |= 1;
1574 }
1575 else if (rel->r_addend != 0)
1576 (*_bfd_error_handler)
1577 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1578 bfd_get_filename (input_bfd), rel->r_addend,
1579 h->root.root.string,
1580 bfd_get_section_name (input_bfd, input_section));
1581 rel->r_addend = 0;
1582
1583 break;
1584
1585 case R_VAX_PC8:
1586 case R_VAX_PC16:
04981bc1 1587 r_vax_pc32_shared:
7b6021f1
MR
1588 if (h == NULL
1589 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1590 || h->forced_local)
90ace9e9
JT
1591 break;
1592 /* Fall through. */
1593 case R_VAX_8:
1594 case R_VAX_16:
1595 case R_VAX_32:
1596 if (info->shared
cf35638d 1597 && r_symndx != STN_UNDEF
90ace9e9
JT
1598 && (input_section->flags & SEC_ALLOC) != 0
1599 && ((r_type != R_VAX_PC8
1600 && r_type != R_VAX_PC16
1601 && r_type != R_VAX_PC32)
da6bcfca
MT
1602 || ((input_section->flags & SEC_CODE)
1603 && (!info->symbolic
1604 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1605 {
1606 Elf_Internal_Rela outrel;
947216bf 1607 bfd_byte *loc;
b34976b6 1608 bfd_boolean skip, relocate;
90ace9e9
JT
1609
1610 /* When generating a shared object, these relocations
1611 are copied into the output file to be resolved at run
1612 time. */
90ace9e9
JT
1613 if (sreloc == NULL)
1614 {
83bac4b0
NC
1615 sreloc = _bfd_elf_get_dynamic_reloc_section
1616 (input_bfd, input_section, /*rela?*/ TRUE);
1617 if (sreloc == NULL)
b34976b6 1618 return FALSE;
90ace9e9
JT
1619 }
1620
b34976b6
AM
1621 skip = FALSE;
1622 relocate = FALSE;
90ace9e9
JT
1623
1624 outrel.r_offset =
1625 _bfd_elf_section_offset (output_bfd, info, input_section,
1626 rel->r_offset);
1627 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1628 skip = TRUE;
90ace9e9 1629 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1630 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1631 outrel.r_offset += (input_section->output_section->vma
1632 + input_section->output_offset);
1633
1634 if (skip)
1635 memset (&outrel, 0, sizeof outrel);
1636 /* h->dynindx may be -1 if the symbol was marked to
1637 become local. */
1638 else if (h != NULL
1639 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1640 || !h->def_regular))
90ace9e9
JT
1641 {
1642 BFD_ASSERT (h->dynindx != -1);
1643 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1644 outrel.r_addend = relocation + rel->r_addend;
1645 }
1646 else
1647 {
1648 if (r_type == R_VAX_32)
1649 {
b34976b6 1650 relocate = TRUE;
90ace9e9
JT
1651 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1652 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1653 &contents[rel->r_offset]) == 0);
1654 outrel.r_addend = relocation + rel->r_addend;
1655 }
1656 else
1657 {
1658 long indx;
1659
8517fae7 1660 if (bfd_is_abs_section (sec))
90ace9e9
JT
1661 indx = 0;
1662 else if (sec == NULL || sec->owner == NULL)
1663 {
1664 bfd_set_error (bfd_error_bad_value);
b34976b6 1665 return FALSE;
90ace9e9
JT
1666 }
1667 else
1668 {
1669 asection *osec;
1670
74541ad4
AM
1671 /* We are turning this relocation into one
1672 against a section symbol. It would be
1673 proper to subtract the symbol's value,
1674 osec->vma, from the emitted reloc addend,
1675 but ld.so expects buggy relocs. */
90ace9e9
JT
1676 osec = sec->output_section;
1677 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1678 if (indx == 0)
1679 {
1680 struct elf_link_hash_table *htab;
1681 htab = elf_hash_table (info);
1682 osec = htab->text_index_section;
1683 indx = elf_section_data (osec)->dynindx;
1684 }
1685 BFD_ASSERT (indx != 0);
90ace9e9
JT
1686 }
1687
1688 outrel.r_info = ELF32_R_INFO (indx, r_type);
1689 outrel.r_addend = relocation + rel->r_addend;
1690 }
1691 }
1692
ddd74d3c 1693 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1694 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1695 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1696 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1697 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1698 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1699 {
1700 if (h != NULL)
1701 (*_bfd_error_handler)
1702 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1703 bfd_get_filename (input_bfd), howto->name,
1704 h->root.root.string,
1705 bfd_get_section_name (input_bfd, input_section));
1706 else
1707 (*_bfd_error_handler)
1708 (_("%s: warning: %s relocation to 0x%x from %s section"),
1709 bfd_get_filename (input_bfd), howto->name,
1710 outrel.r_addend,
1711 bfd_get_section_name (input_bfd, input_section));
1712 }
947216bf
AM
1713 loc = sreloc->contents;
1714 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1715 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1716
1717 /* This reloc will be computed at runtime, so there's no
1718 need to do anything now, except for R_VAX_32
1719 relocations that have been turned into
1720 R_VAX_RELATIVE. */
1721 if (!relocate)
1722 continue;
1723 }
1724
1725 break;
1726
1727 case R_VAX_GNU_VTINHERIT:
1728 case R_VAX_GNU_VTENTRY:
1729 /* These are no-ops in the end. */
1730 continue;
1731
1732 default:
1733 break;
1734 }
1735
b34976b6 1736 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1737 So subtract the difference from the relocation amount since we can't
1738 add it to the offset. */
90ace9e9 1739 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1740 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1741
1742 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1743 contents, rel->r_offset,
1744 relocation, rel->r_addend);
1745
1746 if (r != bfd_reloc_ok)
1747 {
1748 switch (r)
1749 {
1750 default:
1751 case bfd_reloc_outofrange:
1752 abort ();
1753 case bfd_reloc_overflow:
1754 {
1755 const char *name;
1756
1757 if (h != NULL)
dfeffb9f 1758 name = NULL;
90ace9e9
JT
1759 else
1760 {
1761 name = bfd_elf_string_from_elf_section (input_bfd,
1762 symtab_hdr->sh_link,
1763 sym->st_name);
1764 if (name == NULL)
b34976b6 1765 return FALSE;
90ace9e9
JT
1766 if (*name == '\0')
1767 name = bfd_section_name (input_bfd, sec);
1768 }
1769 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1770 (info, (h ? &h->root : NULL), name, howto->name,
1771 (bfd_vma) 0, input_bfd, input_section,
1772 rel->r_offset)))
b34976b6 1773 return FALSE;
90ace9e9
JT
1774 }
1775 break;
1776 }
1777 }
1778 }
1779
b34976b6 1780 return TRUE;
90ace9e9
JT
1781}
1782
1783/* Finish up dynamic symbol handling. We set the contents of various
1784 dynamic sections here. */
1785
b34976b6 1786static bfd_boolean
ce71b576
NC
1787elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1788 struct elf_link_hash_entry *h,
1789 Elf_Internal_Sym *sym)
90ace9e9
JT
1790{
1791 bfd *dynobj;
1792
1793 dynobj = elf_hash_table (info)->dynobj;
1794
1795 if (h->plt.offset != (bfd_vma) -1)
1796 {
1797 asection *splt;
1798 asection *sgot;
1799 asection *srela;
1800 bfd_vma plt_index;
1801 bfd_vma got_offset;
1802 bfd_vma addend;
1803 Elf_Internal_Rela rela;
947216bf 1804 bfd_byte *loc;
90ace9e9
JT
1805
1806 /* This symbol has an entry in the procedure linkage table. Set
1807 it up. */
90ace9e9
JT
1808 BFD_ASSERT (h->dynindx != -1);
1809
3d4d4302
AM
1810 splt = bfd_get_linker_section (dynobj, ".plt");
1811 sgot = bfd_get_linker_section (dynobj, ".got.plt");
1812 srela = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9
JT
1813 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1814
1815 addend = 2 * (h->plt.offset & 1);
1816 h->plt.offset &= ~1;
1817
1818 /* Get the index in the procedure linkage table which
1819 corresponds to this symbol. This is the index of this symbol
1820 in all the symbols for which we are making plt entries. The
1821 first entry in the procedure linkage table is reserved. */
1822 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1823
1824 /* Get the offset into the .got table of the entry that
1825 corresponds to this function. Each .got entry is 4 bytes.
1826 The first two are reserved. */
1827 got_offset = (plt_index + 3) * 4;
1828
1829 /* Fill in the entry in the procedure linkage table. */
1830 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1831 PLT_ENTRY_SIZE);
1832
1833 /* The offset is relative to the first extension word. */
1834 bfd_put_32 (output_bfd,
1835 -(h->plt.offset + 8),
1836 splt->contents + h->plt.offset + 4);
1837
1838 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1839 splt->contents + h->plt.offset + 8);
1840
1841 /* Fill in the entry in the global offset table. */
1842 bfd_put_32 (output_bfd,
1843 (splt->output_section->vma
1844 + splt->output_offset
1845 + h->plt.offset) + addend,
1846 sgot->contents + got_offset);
1847
1848 /* Fill in the entry in the .rela.plt section. */
1849 rela.r_offset = (sgot->output_section->vma
1850 + sgot->output_offset
1851 + got_offset);
1852 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1853 rela.r_addend = addend;
947216bf
AM
1854 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1855 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1856
f5385ebf 1857 if (!h->def_regular)
90ace9e9
JT
1858 {
1859 /* Mark the symbol as undefined, rather than as defined in
1860 the .plt section. Leave the value alone. */
1861 sym->st_shndx = SHN_UNDEF;
1862 }
1863 }
1864
1865 if (h->got.offset != (bfd_vma) -1)
1866 {
1867 asection *sgot;
1868 asection *srela;
1869 Elf_Internal_Rela rela;
947216bf 1870 bfd_byte *loc;
90ace9e9
JT
1871
1872 /* This symbol has an entry in the global offset table. Set it
1873 up. */
3d4d4302
AM
1874 sgot = bfd_get_linker_section (dynobj, ".got");
1875 srela = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
1876 BFD_ASSERT (sgot != NULL && srela != NULL);
1877
1878 rela.r_offset = (sgot->output_section->vma
1879 + sgot->output_offset
1880 + (h->got.offset &~ 1));
1881
1882 /* If the symbol was forced to be local because of a version file
1883 locally we just want to emit a RELATIVE reloc. The entry in
1884 the global offset table will already have been initialized in
1885 the relocate_section function. */
1886 if (info->shared
1887 && h->dynindx == -1
f5385ebf 1888 && h->def_regular)
90ace9e9
JT
1889 {
1890 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1891 }
1892 else
1893 {
1894 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1895 }
1896 rela.r_addend = bfd_get_signed_32 (output_bfd,
1897 (sgot->contents
1898 + (h->got.offset & ~1)));
1899
947216bf
AM
1900 loc = srela->contents;
1901 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1902 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1903 }
1904
f5385ebf 1905 if (h->needs_copy)
90ace9e9
JT
1906 {
1907 asection *s;
1908 Elf_Internal_Rela rela;
947216bf 1909 bfd_byte *loc;
90ace9e9
JT
1910
1911 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1912 BFD_ASSERT (h->dynindx != -1
1913 && (h->root.type == bfd_link_hash_defined
1914 || h->root.type == bfd_link_hash_defweak));
1915
3d4d4302 1916 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1917 BFD_ASSERT (s != NULL);
1918
1919 rela.r_offset = (h->root.u.def.value
1920 + h->root.u.def.section->output_section->vma
1921 + h->root.u.def.section->output_offset);
1922 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1923 rela.r_addend = 0;
947216bf
AM
1924 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1925 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1926 }
1927
1928 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1929 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1930 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1931 sym->st_shndx = SHN_ABS;
1932
b34976b6 1933 return TRUE;
90ace9e9
JT
1934}
1935
1936/* Finish up the dynamic sections. */
1937
b34976b6 1938static bfd_boolean
ce71b576 1939elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1940{
1941 bfd *dynobj;
1942 asection *sgot;
1943 asection *sdyn;
1944
1945 dynobj = elf_hash_table (info)->dynobj;
1946
3d4d4302 1947 sgot = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1948 BFD_ASSERT (sgot != NULL);
3d4d4302 1949 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1950
1951 if (elf_hash_table (info)->dynamic_sections_created)
1952 {
1953 asection *splt;
1954 Elf32_External_Dyn *dyncon, *dynconend;
1955
3d4d4302 1956 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1957 BFD_ASSERT (splt != NULL && sdyn != NULL);
1958
1959 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1960 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1961 for (; dyncon < dynconend; dyncon++)
1962 {
1963 Elf_Internal_Dyn dyn;
1964 const char *name;
1965 asection *s;
1966
1967 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1968
1969 switch (dyn.d_tag)
1970 {
1971 default:
1972 break;
1973
1974 case DT_PLTGOT:
1975 name = ".got";
1976 goto get_vma;
1977 case DT_JMPREL:
1978 name = ".rela.plt";
1979 get_vma:
1980 s = bfd_get_section_by_name (output_bfd, name);
1981 BFD_ASSERT (s != NULL);
1982 dyn.d_un.d_ptr = s->vma;
1983 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1984 break;
1985
1986 case DT_PLTRELSZ:
1987 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1988 BFD_ASSERT (s != NULL);
eea6121a 1989 dyn.d_un.d_val = s->size;
90ace9e9
JT
1990 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1991 break;
1992
1993 case DT_RELASZ:
1994 /* The procedure linkage table relocs (DT_JMPREL) should
1995 not be included in the overall relocs (DT_RELA).
1996 Therefore, we override the DT_RELASZ entry here to
1997 make it not include the JMPREL relocs. Since the
1998 linker script arranges for .rela.plt to follow all
1999 other relocation sections, we don't have to worry
2000 about changing the DT_RELA entry. */
2001 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2002 if (s != NULL)
eea6121a 2003 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2004 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2005 break;
2006 }
2007 }
2008
2009 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2010 if (splt->size > 0)
90ace9e9
JT
2011 {
2012 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2013 bfd_put_32 (output_bfd,
2014 (sgot->output_section->vma
2015 + sgot->output_offset + 4
2016 - (splt->output_section->vma + 6)),
2017 splt->contents + 2);
2018 bfd_put_32 (output_bfd,
2019 (sgot->output_section->vma
2020 + sgot->output_offset + 8
2021 - (splt->output_section->vma + 12)),
2022 splt->contents + 8);
cedb70c5 2023 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2024 = PLT_ENTRY_SIZE;
2025 }
2026 }
2027
2028 /* Fill in the first three entries in the global offset table. */
eea6121a 2029 if (sgot->size > 0)
90ace9e9
JT
2030 {
2031 if (sdyn == NULL)
2032 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2033 else
2034 bfd_put_32 (output_bfd,
2035 sdyn->output_section->vma + sdyn->output_offset,
2036 sgot->contents);
2037 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2038 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2039 }
2040
2041 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2042
b34976b6 2043 return TRUE;
90ace9e9
JT
2044}
2045
9b90d8fd
MR
2046static enum elf_reloc_type_class
2047elf_vax_reloc_type_class (const Elf_Internal_Rela *rela)
2048{
2049 switch ((int) ELF32_R_TYPE (rela->r_info))
2050 {
2051 case R_VAX_RELATIVE:
2052 return reloc_class_relative;
2053 case R_VAX_JMP_SLOT:
2054 return reloc_class_plt;
2055 case R_VAX_COPY:
2056 return reloc_class_copy;
2057 default:
2058 return reloc_class_normal;
2059 }
2060}
2061
6db7e006
MR
2062static bfd_vma
2063elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
2064 const arelent *rel ATTRIBUTE_UNUSED)
2065{
2066 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2067}
2068
90ace9e9
JT
2069#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2070#define TARGET_LITTLE_NAME "elf32-vax"
2071#define ELF_MACHINE_CODE EM_VAX
2072#define ELF_MAXPAGESIZE 0x1000
2073
2074#define elf_backend_create_dynamic_sections \
2075 _bfd_elf_create_dynamic_sections
2076#define bfd_elf32_bfd_link_hash_table_create \
2077 elf_vax_link_hash_table_create
c152c796 2078#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2079
2080#define elf_backend_check_relocs elf_vax_check_relocs
2081#define elf_backend_adjust_dynamic_symbol \
2082 elf_vax_adjust_dynamic_symbol
2083#define elf_backend_size_dynamic_sections \
2084 elf_vax_size_dynamic_sections
74541ad4 2085#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2086#define elf_backend_relocate_section elf_vax_relocate_section
2087#define elf_backend_finish_dynamic_symbol \
2088 elf_vax_finish_dynamic_symbol
2089#define elf_backend_finish_dynamic_sections \
2090 elf_vax_finish_dynamic_sections
9b90d8fd 2091#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9
JT
2092#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2093#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
6db7e006 2094#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
2095#define bfd_elf32_bfd_merge_private_bfd_data \
2096 elf32_vax_merge_private_bfd_data
2097#define bfd_elf32_bfd_set_private_flags \
2098 elf32_vax_set_private_flags
2099#define bfd_elf32_bfd_print_private_bfd_data \
2100 elf32_vax_print_private_bfd_data
2101
2102#define elf_backend_can_gc_sections 1
2103#define elf_backend_want_got_plt 1
2104#define elf_backend_plt_readonly 1
2105#define elf_backend_want_plt_sym 0
2106#define elf_backend_got_header_size 16
f0fe0e16 2107#define elf_backend_rela_normal 1
90ace9e9
JT
2108
2109#include "elf32-target.h"
This page took 0.676537 seconds and 4 git commands to generate.